Game Dynasty
Chapter 216 Tracking
Chapter 216 Tracking
Time passed quietly, and at one o'clock, the monitoring showed that only the computer connected to the network hadn't been turned off. [] Of course, the server and Yang Chaoran's computer occupied by Ge Jun were not turned off either.
At this time, Ge Jun also successfully completed the Trojan horse implantation of the latest remote control program, which can detect any action on the server, and even display the desktop of the target computer in 16-bit color.However, since the opponent is also a top hacker, as long as he is a little more careful, he can find anomalies from the data packets, so the desktop display will not start. (The Trojan horse implanted through the automatic update of the online version of the anti-virus software in the morning is relatively simple.)
When Ge Jun finished all this, Liu Xianhe and Dong Xinwu kept watching from the sidelines.In the end, Liu Xianhe and Dong Xinwu couldn't laugh or cry. Compared with Ge Jun's remote program, their tools were like shotguns and cannons.
However, both Ge Jun and Liu Xianhe were a little puzzled. When Ge Jun used the latest control program to scan almost the entire computer, he did not find the Trojan horse server implanted by the other party. This undoubtedly shows that the opponent is very cautious. .
At 01:30, the red light indicator on Ge Jun's monitoring program suddenly lit up.The beeping alarm sound lifted the spirits of all drowsy people at the same time!
"Here we come!" Ge Jun said in a deep voice as he continued to send back the data.
"They really came through the dial-up program, um, they started to send to the server. Can I intercept a copy." Ge Jun looked back at Liu Xianhe while looking at the constantly refreshing data, "Wait a minute, do you know this?"
"OK." Liu Xianhe nodded happily.
Soon, as the uploading of the other party's server was completed, Ge Jun immediately took advantage of the broadband plus local area to snatch the entire server back!
Ge Jun's access method is to control Yang Chaoran's computer through broadband, and then enter the internal aspect through Yang Chaoran's computer. Dong Xinwu, who has never been very talkative, made Ge Jun's eyes shine. The technology makes Ge Jun also secretly surprised. You know, if Yang Chaoran's computer is not hidden as offline, then the opponent is likely to scan whether other computers are still online at the first time. If there is, then the intrusion will definitely be given up. Or delay and raise awareness.
Sure enough, as Ge Jun expected, one second after Ge Jun almost intercepted the opponent's implanted server with lightning speed and erased the operation log, the opponent started the server and remotely controlled it. .
"It's done! Sure enough, he scanned the
Group! "Wiping off the sweat from his forehead, Ge Jun gave Dong Xinwu a grateful glance. If it wasn't for Dong Xinwu, I guess this level would be difficult. Ge Jun's original plan was to hang Yang Chaoran's computer status on the server to give the opponent the illusion, but Dong Xinwu It is hidden in a crooked way. In comparison, Dong Xinwu's move is much more clever.
Smiling slightly, Dong Xinwu took a sip of tea, then took the server sample handed over by Ge Jun, unplugged his computer and inserted the USB drive into it.His sophistication and prudence made Xi Xiaoding speechless.
"Well, they still used the springboard this time, and the target
It is 6113678232. "Ge Jun kept reporting through the latest data sent back.
"From Henan." Without even thinking about it, Liu Xianhe reported the area in one mouthful. "this
Let me track it down, Lao Dong analyzes the Trojan horse samples.By the way... Xiaojun, can you give me a copy of your control terminal? "
Obviously... Ge Jun's control program has exceeded the functions of Liu Xianhe and others' control program by too many functions.
It should be noted that those who can skillfully use a hacker software are not all hackers. Many times, those who use a scanner to scan for vulnerabilities and are proud of it are called rker, or script kids.The real hker masters more massive network knowledge and assembly knowledge, and they can even complete a perfect intrusion without using any tools.Of course, if there are tools that are not used instead of using a large number of commands to complete the intrusion like a trick, it is purely an act of pretending to be b... and the fact is the same, almost every top expert has a set of hacking tools and Trojan horses made by himself dictionary.
Hearing Liu Xianhe's request, Ge Jun smiled and nodded without hesitation. At the same time, he took Xi Xiaoding's USB flash drive and copied the program of his computer.
But when Liu Xianhe was about to sweep the cat, Dong Xinwu stopped him: "Wait, let me make the analysis first and then proceed."
"If the opponent's server has an anti-scan function, then we'd better be careful." Dong Xinwu added.
Ge Jun raised his eyebrows, but Liu Xianhe nodded as if he had suddenly realized.
Seeming to understand Ge Jun's doubts, Dong Xinwu explained with a rare smile, "In so many cases we have come into contact with, a certain foreign hacker group named Duke has such a control system, although he has not personally come into contact with it." But according to the news, it is indeed possible to perform anti-scanning on broilers to achieve the purpose of evading tracking.”
"Duke?" Ge Jun nodded thoughtfully, "Well, it's better to analyze it, by the way, have you noticed if there is any
rne this identity mark. "
"
Prince rne? "Dong Xinwu repeated.
"It's the prince. If you're right, he's on the same team as the duke you just mentioned. It was this prince who took the lead in the cheating attack and the crappy virus Trojan horse that we encountered last time."
Liu Xianhe and Dong Xinwu looked at each other, "Are you talking about the vampire kingdom?"
"This is the vampire kingdom!"
■
Perhaps knowing that this was the last chance, Karev's movements were not as relaxed and comfortable as his expression, on the contrary, he became more cautious.
Such a move is indeed a bit abnormal for Powell, but for Powell, it is obviously a good thing that his always reckless partner becomes cautious.
"
The group scan is complete and no other computers are turned on. "
"The Trojan horse scan is complete, and no other servers have been found."
"The system log has been scanned and no suspicious operations were found."
Listening to Karev's report of various progress in a deep voice, Powell's expression became relaxed.
"It would be even more perfect if we could bring the Duke of York's server." Karev sighed after confirming the last operation.
Powell was suddenly surprised. You know, Karev and York have never been in harmony.
Not paying attention to his companion's expression at all, Karev took a sip of his coffee and then moved his fingers like flying: "Okay, buddy, prepare all the answer materials, I'm going to simulate m and users."
■
"The analysis is complete, you can scan."
Everyone in the room gathered their spirits.For a moment of silence, only the wall clock on the wall was beeping, marking the passage of time.
After the analysis of the server was completed, Liu Xianhe also turned on the scanner at the same time to detect the
After scanning, after a while, the access authority is obtained. For a door that has already been opened, it is no longer necessary to enter.
The next step is to find the access
However, Liu Xianhe has reason to believe that it is impossible for the opponent to detect this small visit when he is concentrating all his energy on the invasion.
"Speed, Lao Liu, their second set of server has also been implanted, this is to simulate the m address."
"Okay, it's done. The address of the springboard on the next floor is 6121112468." Quickly answered, Liu Xianhe kept flying his fingers on the keyboard.
On the invisible network, two groups of people started to race against time.
On the one hand, Ge Jun needs to obtain the opponent's actual address before the opponent completely cracks the password; There is a slight negligence.
Time is fast and it seems to be slow.
Ge Jun kept reporting the opponent's progress through the feedback information, and Liu Xianhe kept scanning, uploading to the server, and then bypassing all possible dissatisfaction traps to find and analyze the springboard for the next level. Yes, the current of the two springboards was analyzed in succession
There are very few connections.
"Oops! This may be the server! There are currently more than 400 connections!"
With Liu Xianhe's exclamation, everyone's expressions changed in unison!
There are currently more than 400 connections!This means that at least 400 computers are accessing at the same time, that is to say, all [-] computers may be the springboard for the next four floors!And if you want to add more than [-] items
Find the springboard for the real intruder... Xi Xiaoding, who was still worried at the side, turned pale in an instant.
And on Ge Jun's computer, a row of numbers clearly jumped out at this moment.
"Mr. Liu is accessing the server."
"Scan! Then implant my Trojan horse to see if there is a server on the other party's computer. If there is, grab it directly. If not, use my horse to track and intercept packets!"
After Ge Jun finished speaking, beads of sweat were already dripping from his forehead.
There is no doubt that this is a gamble.If it is detected by the opponent, all anti-tracking efforts will fall short.
Time passed quietly, and at one o'clock, the monitoring showed that only the computer connected to the network hadn't been turned off. [] Of course, the server and Yang Chaoran's computer occupied by Ge Jun were not turned off either.
At this time, Ge Jun also successfully completed the Trojan horse implantation of the latest remote control program, which can detect any action on the server, and even display the desktop of the target computer in 16-bit color.However, since the opponent is also a top hacker, as long as he is a little more careful, he can find anomalies from the data packets, so the desktop display will not start. (The Trojan horse implanted through the automatic update of the online version of the anti-virus software in the morning is relatively simple.)
When Ge Jun finished all this, Liu Xianhe and Dong Xinwu kept watching from the sidelines.In the end, Liu Xianhe and Dong Xinwu couldn't laugh or cry. Compared with Ge Jun's remote program, their tools were like shotguns and cannons.
However, both Ge Jun and Liu Xianhe were a little puzzled. When Ge Jun used the latest control program to scan almost the entire computer, he did not find the Trojan horse server implanted by the other party. This undoubtedly shows that the opponent is very cautious. .
At 01:30, the red light indicator on Ge Jun's monitoring program suddenly lit up.The beeping alarm sound lifted the spirits of all drowsy people at the same time!
"Here we come!" Ge Jun said in a deep voice as he continued to send back the data.
"They really came through the dial-up program, um, they started to send to the server. Can I intercept a copy." Ge Jun looked back at Liu Xianhe while looking at the constantly refreshing data, "Wait a minute, do you know this?"
"OK." Liu Xianhe nodded happily.
Soon, as the uploading of the other party's server was completed, Ge Jun immediately took advantage of the broadband plus local area to snatch the entire server back!
Ge Jun's access method is to control Yang Chaoran's computer through broadband, and then enter the internal aspect through Yang Chaoran's computer. Dong Xinwu, who has never been very talkative, made Ge Jun's eyes shine. The technology makes Ge Jun also secretly surprised. You know, if Yang Chaoran's computer is not hidden as offline, then the opponent is likely to scan whether other computers are still online at the first time. If there is, then the intrusion will definitely be given up. Or delay and raise awareness.
Sure enough, as Ge Jun expected, one second after Ge Jun almost intercepted the opponent's implanted server with lightning speed and erased the operation log, the opponent started the server and remotely controlled it. .
"It's done! Sure enough, he scanned the
Group! "Wiping off the sweat from his forehead, Ge Jun gave Dong Xinwu a grateful glance. If it wasn't for Dong Xinwu, I guess this level would be difficult. Ge Jun's original plan was to hang Yang Chaoran's computer status on the server to give the opponent the illusion, but Dong Xinwu It is hidden in a crooked way. In comparison, Dong Xinwu's move is much more clever.
Smiling slightly, Dong Xinwu took a sip of tea, then took the server sample handed over by Ge Jun, unplugged his computer and inserted the USB drive into it.His sophistication and prudence made Xi Xiaoding speechless.
"Well, they still used the springboard this time, and the target
It is 6113678232. "Ge Jun kept reporting through the latest data sent back.
"From Henan." Without even thinking about it, Liu Xianhe reported the area in one mouthful. "this
Let me track it down, Lao Dong analyzes the Trojan horse samples.By the way... Xiaojun, can you give me a copy of your control terminal? "
Obviously... Ge Jun's control program has exceeded the functions of Liu Xianhe and others' control program by too many functions.
It should be noted that those who can skillfully use a hacker software are not all hackers. Many times, those who use a scanner to scan for vulnerabilities and are proud of it are called rker, or script kids.The real hker masters more massive network knowledge and assembly knowledge, and they can even complete a perfect intrusion without using any tools.Of course, if there are tools that are not used instead of using a large number of commands to complete the intrusion like a trick, it is purely an act of pretending to be b... and the fact is the same, almost every top expert has a set of hacking tools and Trojan horses made by himself dictionary.
Hearing Liu Xianhe's request, Ge Jun smiled and nodded without hesitation. At the same time, he took Xi Xiaoding's USB flash drive and copied the program of his computer.
But when Liu Xianhe was about to sweep the cat, Dong Xinwu stopped him: "Wait, let me make the analysis first and then proceed."
"If the opponent's server has an anti-scan function, then we'd better be careful." Dong Xinwu added.
Ge Jun raised his eyebrows, but Liu Xianhe nodded as if he had suddenly realized.
Seeming to understand Ge Jun's doubts, Dong Xinwu explained with a rare smile, "In so many cases we have come into contact with, a certain foreign hacker group named Duke has such a control system, although he has not personally come into contact with it." But according to the news, it is indeed possible to perform anti-scanning on broilers to achieve the purpose of evading tracking.”
"Duke?" Ge Jun nodded thoughtfully, "Well, it's better to analyze it, by the way, have you noticed if there is any
rne this identity mark. "
"
Prince rne? "Dong Xinwu repeated.
"It's the prince. If you're right, he's on the same team as the duke you just mentioned. It was this prince who took the lead in the cheating attack and the crappy virus Trojan horse that we encountered last time."
Liu Xianhe and Dong Xinwu looked at each other, "Are you talking about the vampire kingdom?"
"This is the vampire kingdom!"
■
Perhaps knowing that this was the last chance, Karev's movements were not as relaxed and comfortable as his expression, on the contrary, he became more cautious.
Such a move is indeed a bit abnormal for Powell, but for Powell, it is obviously a good thing that his always reckless partner becomes cautious.
"
The group scan is complete and no other computers are turned on. "
"The Trojan horse scan is complete, and no other servers have been found."
"The system log has been scanned and no suspicious operations were found."
Listening to Karev's report of various progress in a deep voice, Powell's expression became relaxed.
"It would be even more perfect if we could bring the Duke of York's server." Karev sighed after confirming the last operation.
Powell was suddenly surprised. You know, Karev and York have never been in harmony.
Not paying attention to his companion's expression at all, Karev took a sip of his coffee and then moved his fingers like flying: "Okay, buddy, prepare all the answer materials, I'm going to simulate m and users."
■
"The analysis is complete, you can scan."
Everyone in the room gathered their spirits.For a moment of silence, only the wall clock on the wall was beeping, marking the passage of time.
After the analysis of the server was completed, Liu Xianhe also turned on the scanner at the same time to detect the
After scanning, after a while, the access authority is obtained. For a door that has already been opened, it is no longer necessary to enter.
The next step is to find the access
However, Liu Xianhe has reason to believe that it is impossible for the opponent to detect this small visit when he is concentrating all his energy on the invasion.
"Speed, Lao Liu, their second set of server has also been implanted, this is to simulate the m address."
"Okay, it's done. The address of the springboard on the next floor is 6121112468." Quickly answered, Liu Xianhe kept flying his fingers on the keyboard.
On the invisible network, two groups of people started to race against time.
On the one hand, Ge Jun needs to obtain the opponent's actual address before the opponent completely cracks the password; There is a slight negligence.
Time is fast and it seems to be slow.
Ge Jun kept reporting the opponent's progress through the feedback information, and Liu Xianhe kept scanning, uploading to the server, and then bypassing all possible dissatisfaction traps to find and analyze the springboard for the next level. Yes, the current of the two springboards was analyzed in succession
There are very few connections.
"Oops! This may be the server! There are currently more than 400 connections!"
With Liu Xianhe's exclamation, everyone's expressions changed in unison!
There are currently more than 400 connections!This means that at least 400 computers are accessing at the same time, that is to say, all [-] computers may be the springboard for the next four floors!And if you want to add more than [-] items
Find the springboard for the real intruder... Xi Xiaoding, who was still worried at the side, turned pale in an instant.
And on Ge Jun's computer, a row of numbers clearly jumped out at this moment.
"Mr. Liu is accessing the server."
"Scan! Then implant my Trojan horse to see if there is a server on the other party's computer. If there is, grab it directly. If not, use my horse to track and intercept packets!"
After Ge Jun finished speaking, beads of sweat were already dripping from his forehead.
There is no doubt that this is a gamble.If it is detected by the opponent, all anti-tracking efforts will fall short.
You'll Also Like
-
The Martial Soul White Tiger Ability Lock is unparalleled in the world.
Chapter 90 2 hours ago -
Douluo Continent: Character Monologues, Starting with Qian Daoliu!
Chapter 90 2 hours ago -
Douluo Continent: I, the world's greatest immortal master, have taken Ning Rongrong as my disci
Chapter 64 2 hours ago -
Douluo Continent: The creation of Jixia Academy made Bibi Dong drool with envy.
Chapter 112 2 hours ago -
Bizarre Marriage: I am the Bizarre Emperor, and my wife is a sweet and gentle school beauty.
Chapter 131 2 hours ago -
Who would still play tennis after being reborn?
Chapter 140 2 hours ago -
Her guards
Chapter 63 2 hours ago -
Did the world end today?
Chapter 154 2 hours ago -
Shrouding the Heavens: Starting by joining the Holy Land of Yao Guang
Chapter 183 2 hours ago -
Douluo Continent: When Huo Yuhao Becomes the Lord of the End
Chapter 142 2 hours ago